Across
- 2. Paranoia with governance—and for once that’s a compliment.
- 4. Cybercriminal Group that treats mass extortion like a quarterly business plan.
- 6. One zeroday log message to rule them all—and to invite remote code execution in for tea.
- 10. “When an attacker pretends to be you… which is rude, because you barely want to be you on Mondays.”
- 14. The door that was “definitely locked” until someone checked the logs.
- 15. Thousands of machines working together to ruin someone’s day. Teamwork!
- 16. The bug that made everyone learn what memory feels like when it overshares
- 19. The business model that turns backups from “nice to have” into “board‑level KPI.”
- 20. “Did someone say free database access?”
- 21. Not a horse, but still extremely good at hosting guests you didn’t invite.
- 22. The file transfer brand that learned what “blast radius” means.
Down
- 1. Your network’s bouncer; denies service to anyone not on the list (and some who are).
- 3. Why adversaries hack who you trust instead of hacking you—because efficiency matters, even in crime.
- 5. A deliciously fake host that flatters attackers into oversharing their techniques.
- 7. That “urgent password reset” that somehow always lands 5 minutes before lunch.
- 8. words -
- 9. Your keyboard’s diary—written without consent.
- 11. The franchised ransomware brand with more press releases than your product launch.
- 12. This malware name is brutally honest.
- 13. When bash said: ‘I’ll run whatever you put in here, no questions asked.’
- 17. When sensitive information goes on an unsanctioned field trip.
- 18. The internet’s basement—less spiders than expected, more stolen credentials than desired.
